Network protection log

The ESET Internet Security network protection saves all important events in a log file, which can be viewed directly from the main menu. Click Tools > More tools > Log files and then select Network protection from the Log drop-down menu.

The log files can be used to detect errors and reveal intrusions into your system. ESET network protection logs contain the following data:

Date and time of event

Name of event


Target network address

Network communication protocol

Rule applied, or name of worm, if identified

Application involved


A thorough analysis of this data can help detect attempts to compromise system security. Many other factors indicate potential security risks and allow you to minimize their impact: frequent connections from unknown locations, multiple attempts to establish connections, unknown applications communicating or unusual port numbers used.


Security vulnerability exploitation

The message of security vulnerability exploitation is logged even if the particular vulnerability is already patched since the exploitation attempt is detected and blocked on the network level before actual exploitation could happen.